Network Installation & Design

Whether it’s installing and designing new, or expanding or replacing existing IT infrastructure, our services are made up of industry-leading talent, enabling us to deliver superior infrastructure solutions on-time & on-budget.

We are fortunate to have a wealth of industry-accredited project managers, engineers, and consultants and have decades of experience.

Pricing

Service documents

Framework

Service ID

Contact

Service scope

Service scope

Service constraints

N/A

System requirements

N/A

User support

User support

Email or online ticketing support

Yes, at extra cost

Support response times

Standard support hours are Monday - Friday, 8:00 AM - 8:00 PM, excluding public holidays. We also have an on-call engineer for any out-of-hours or critical faults. Out-of-hours support will be charged on an hourly basis. Response times are as follows: Critical - 30 minutes, High - 1 hour, Medium - 2 hours, Low - 24 hours.

User can manage status and priority of support tickets

Yes

Online ticketing support accessibility

None or don’t know

Phone support

Yes

Phone support availability

24 hours, 7 days a week

Web chat support

No

Onsite support

Yes, at extra cost

Support levels

We offer standard support (8:00 AM - 8:00 PM, M-F, excluding public holidays) or 24x7 support, the cost of which depends on the number of users and the number of devices supported.

Support available to third parties

Yes

Onboarding and offboarding

Onboarding and offboarding

Getting started

User documentation, on-site training if necessary

Service documentation

Yes

Documentation formats

PDF

End-of-contract data extraction

Data is requested from account manager, and data is provided in the format of their choice.

End-of-contract process

Contract will include full scope of the project to be agreed upon by both parties prior to work commencing. Any out-of-scope work will be charged.

Using the service

Using the service

Web browser interface

No

API

No

Command line interface

No

Scaling

Scaling

Scaling available

No

Independence of resources

Efficiency audits when scoping the project, 24x7 monitoring

Usage notifications

Yes

Usage reporting

Email

Analytics

Analytics

Infrastructure or application metrics

Yes

Metrics types

Network

Reporting types

Reports on request

Resellers

Resellers

Supplier type

Reseller providing extra features and support

Organisation whose services are being resold

Cisco, Dell, Meraki, HP, Netgear, VMware, Microsoft

Staff security

Staff security

Staff security clearance

Other security clearance

Government security clearance

Up to Developed Vetting (DV)

Asset protection

Asset protection

Knowledge of data storage and processing locations

Yes

Data storage and processing locations

United Kingdom

User control over data storage and processing locations

Yes

Datacentre security standards

Complies with a recognised standard (for example CSA CCM version 3.0)

Penetration testing frequency

Less than once a year

Penetration testing approach

In-house

Protecting data at rest

Physical access control, complying with another standard

Encryption of all physical media

Scale, obfuscating techniques, or data storage sharding

Data sanitisation process

No

Equipment disposal approach

A third-party destruction service

Backup and recovery

Backup and recovery

Backup and recovery

No

Data-in-transit protection

Data-in-transit protection

Data protection between buyer and supplier networks

IPsec or TLS VPN gateway

Data protection within supplier network

Other

Other protection within supplier network

Disc encryption and separate vlan's

Availability and resilience

Availability and resilience

Guaranteed availability

99.95%

Approach to resilience

Available upon request

Outage reporting

Email and text alerts

Identity and authentication

Identity and authentication

User authentication

2-factor authentication

Public key authentication (including by TLS client certificate)

Identity federation with existing provider (for example Google apps)

Dedicated link (for example VPN)

Username or password

Access restrictions in management interfaces and support channels

Access in management interfaces is restricted to a management network, only accessible by necessary support staff.

Access restriction testing frequency

At least once a year

Management access authentication

2-factor authentication

Dedicated link (for example VPN)

Username or password

Devices users manage the service through

Dedicated device over multiple services or networks

Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

We follow ISO 27001 and 9001 internal processes and perform monthly audits to ensure procedure is being followed and documented properly.

Operational security

Operational security

Configuration and change management standard

Supplier-defined controls

Configuration and change management approach

Change requests are submitted through the customer portal and are assessed by the technical team to ensure suitability. Documentation is then made to track all changes made.

Vulnerability management type

Supplier-defined controls

Vulnerability management approach

Potential threat awareness comes from our monitoring systems which are updated constantly. Patches are deployed as soon as they are made available and tested with existing products. Threat assessment is made by the technical team each time a threat is brought to their attention, whether through another employee, through our monitoring system, or through another channel, and preventative measures are put into place.

Protective monitoring type

Supplier-defined controls

Protective monitoring approach

Our monitoring system is constantly running to instantly notify us of any compromises. If a breach is detected, the system will automatically mitigate the threat by quarantining the affected files and our team will be notified. Compromises are treated as "critical" incidents and our response time is 30 minutes. Once the breach is controlled, the affected users will be notified and a mitigation and resolution plan is put in place.